Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Runtime Error 52 in DKSPORTS Baseball 2014 games


  • Please log in to reply
30 replies to this topic

#1 jimwwms

jimwwms

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:06:27 PM

Posted 22 May 2014 - 05:39 PM

I have been playing DKSPORTS ActionBaseball via netplay for two versions of the game.  In the 2013 version, I was able to host games and also play with another person as the online host with no issues.  Since loading the new 2014 version of the game, I am able to HOST games but every time I try to play with another gamer hosting, I am able to connect to their IP, they are able to start the game, but when the game reaches the point where ROSTERS are to come up, I get "RUNTIME ERROR 52" ... my opponent says they are on the Roster page. 

 

My configuration is WINDOWS 7 with all the latest updates (thought 5/15/2014)  I am not playing via WIFI but am connected direct to the Cable Modem.  My internet provider is Suddenlink.   I run the program as an Administrator.  I have checked my WIndows Firewall and it is passing the info, I have Kapersky Internet Security but have the FIREWALL OFF when attempting to play.

 

What has me and the folks at DKSPORTS scratching our heads is.... I can always play as the HOST.  I don't have a connection issue it seems since I can always get the game connected.  AND, I didn't have the issue with the 2013 version of the game. 

 

Are there Windows settings or security items that might be causing this?  Perhaps the Kapersky programs could be causing the issue, but wouldn't they cause them whether I was hosting or someone else is?

 

Thanks in advance for your input.


Edited by hamluis, 23 May 2014 - 11:05 AM.
Moved from Win 7 to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


m

#2 Roodo

Roodo

  • Members
  • 760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:27 PM

Posted 22 May 2014 - 06:13 PM

I would look for any patches that this game has.



#3 jimwwms

jimwwms
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:06:27 PM

Posted 22 May 2014 - 06:16 PM

NO PATCHES....

 

My game is current and I have been working with the GAME PROGRAMMER for well over a month now.


Edited by jimwwms, 22 May 2014 - 06:18 PM.


#4 Roodo

Roodo

  • Members
  • 760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:27 PM

Posted 22 May 2014 - 06:29 PM

set security to medium or lower. This may be just a corrupted file and needs reinstall. VB cant read or write to a file



#5 SacSurge

SacSurge

  • Members
  • 106 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 22 May 2014 - 08:36 PM

We have reinstalled his game already but no luck. Where are you saying to lower security at? The Baseball game is named as an exception on the firewall.



#6 Roodo

Roodo

  • Members
  • 760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:27 PM

Posted 22 May 2014 - 08:56 PM

what firewall are you using? Have you made the same exception on your router?

What port is being used?



#7 SacSurge

SacSurge

  • Members
  • 106 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 22 May 2014 - 09:03 PM

Yes, But he evens removes his router and goes cable modem direct and the hosting machines are all port forwarded for port 1452 for baseball. We have been playing these leagues for many years but used a different game. The odd thing is when he host all works fine but when he is not the host is when the game will not run. There are hundreds of us playing in the leagues and nobody else gets this runtime error 52 so I was thinking it was a system file corrupted.

 

The windows firewall is where the exception is set. He also uses Kaspersky Anti-virus but that works well with the game usually.


Edited by SacSurge, 22 May 2014 - 09:07 PM.


#8 Roodo

Roodo

  • Members
  • 760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:27 PM

Posted 22 May 2014 - 09:10 PM

That's the issue...Whats different? then everyone else. When not hosting a file cant be written to.



#9 SacSurge

SacSurge

  • Members
  • 106 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 22 May 2014 - 09:14 PM

Just not sure but I did have him install Malwarebytes and it found quite a few files(362) and quarantined them so maybe he needs you guys to check some scan logs or something and see if something is still present or something got corrupted.


Edited by SacSurge, 22 May 2014 - 09:16 PM.


#10 jimwwms

jimwwms
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:06:27 PM

Posted 23 May 2014 - 08:44 AM

I was also wondering if some of the "junk" I have on the computer could be causing the RUNTIME ERROR 52?  Is there a good way to CLEAN my computer without losing important programs and data?

 

The MALWAREBYTES program found 348 +/- items that I have put in Quarantine.  I will also run the Kapersky ANTI VIRUS and see what else I have allowed in.



#11 hamluis

hamluis

    Moderator


  • Moderator
  • 54,862 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:05:27 PM

Posted 23 May 2014 - 11:04 AM

I

The MALWAREBYTES program found 348 +/- items that I have put in Quarantine.  I will also run the Kapersky ANTI VIRUS and see what else I have allowed in.

 

Topic moved to Am I Infected forum, where folks will attempt to help with malware issues.

 

Louis



#12 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,031 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:03:27 PM

Posted 23 May 2014 - 02:18 PM

Please run the following.

Please run the ESET OnlineScan

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

 

 
 
Please download Malwarebytes Anti-Malware.
 
1)  Double-click on mbam-setup.exe, then click on Run to install the application, follow the prompts through the installation.
 
2)  Malwarebytes will automatically open.  If this is the first time you have run this version of Malwarbytes you will see an image like the one below.
 
mbam1_zps95cc812c.png
 
Click on Update Now, after Malwarebytes is updated click on Scan.
 
If this isn't the first time you have run this version, then you will see an image like the one below.  Click on Scan
 
mbam1_zps98e7fba9.png
 
You will be prompted to update Malwarebytes, to do so click on Update Now.
 
 mbam2_zps85f38f0c.png
 
3)  The scan will automatically run now.
 
mbamreplace_zps3ead4824.png
 
 
4)  When the scan is complete the results will be displayed.  Click on Quarantine All, then click on Apply Actions
 
mbam4_zps23e52ad4.png
 
 
5)  To complete any actions taken you will be asked if you want to restart your computer, click on Yes
 
 mbam4_zps490948cc.png
 
6)  Please post the Malwarebytes log.
 
To find your Malwarebytes log,download mbam-check.exe from here and save it to your desktop.
 
To open the log double click on mbam-check.exe on your desktop.  When the log opens, scroll down toward the bottom of the log to Quarantined Items.  Copy and paste this in your next post.

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#13 jimwwms

jimwwms
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:06:27 PM

Posted 23 May 2014 - 05:58 PM

THANKS, ARACHNA.  I just finished an ALL DAY RUN of Kapersky Anti virus.... will post results in FILES under "jimwwms1".  It is a txt file.

 

Oh well, I guess the FILE DATABASE is not for uploading user inputs. 

 

Now to see if I can figure out how to attach the file.


Edited by jimwwms, 23 May 2014 - 06:09 PM.


#14 jimwwms

jimwwms
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:06:27 PM

Posted 23 May 2014 - 06:18 PM

MALWAREBYTES SCAN RESULTS FROM 5/20/2014

 

Quarantined Items:
===================
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\NativeMessaging\CT3307181\nativeMessaging\nmHostConfig.json
Vendor: Trojan.FakeFlash, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\Downloads\flash.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon
Vendor: PUP.Optional.ConsumerInput.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\consumerinput_update
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsv42EE\SpSetup.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\redirect.js
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Conduit\ValueApps\IE\64
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nss3519.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\background.html
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3COMClassService.1.0
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Conduit\ValueApps\IE\ValueAppsLoader.dll
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\DefaultTabToolbarBHO.DefaultTabToolbar
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\CLSID\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\ctbe.exe
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\TYPELIB\{FEB62B15-CC00-4736-AAEC-BA046C9DFF73}
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.InboxToolBar.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER|{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Offline\{590297ED-B4B0-482A-A75D-3B2049627ACD}
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\TestIfExeExist\CT3307181\nativeMessaging\TBMessagingHost.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\js\background.js
Vendor: PUP.Optional.AdLyrics, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\xkclnatwxercr\software\Re-markit_2040-2081.exe
Vendor: PUP.GamePlayLabs, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\GiantSavings.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\documentEvents.js
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\APPID\{38495740-0035-4471-851E-F5BBB86AB085}
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\CLSID\{93DBF2BB-A2B3-4683-A92E-57E60751F346}\INPROCSERVER32
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3COMClassService
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\icon48.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\mam-ct3316263
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A1E28287-1A31-4B0F-8D05-AA8C465D3C5A}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\popup.js
Vendor: PUP.Optional.Superfish.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage-journal
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsp9D5A.exe
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nss4B0C.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\google.png
Vendor: PUP.Optional.Conduit, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Windows\System32\Tasks\BackgroundContainer Startup Task
Vendor: PUP.Optional.Rapiddown, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\n202\s202.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\pinit.png
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabBHO.dll
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\INTERFACE\{B51437A3-E0E6-4046-A6E4-173B1E777C85}
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3311333
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|APISupport
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\PublisherImages
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3WebMachine.1.0
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\setup.ini.txt
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Download
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\CONDUIT\ValueApps
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsaC356.exe
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{C9A54DFE-051F-49C5-9FC7-ECB81DC6C69F}
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\CT3307181.txt
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0
Vendor: PUP.Optional.Superfish.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Conduit\ValueApps
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\dlLogic.exe
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3311333\chromeid.txt
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\maximize-3.png
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\InternalJS.js
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3WebSvc
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{1F8EDE97-36D5-422A-B8F0-9406E2D87C60}
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{8050556E-4AD3-40BD-B338-7DBB0D5C10C8}
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\icon16.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage-journal
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\minimize-1.png
Vendor: PUP.Optional.DomaIQ.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\DomaIQ
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0\MonitoringTool-3.2.1-712.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3WebMachineFallback
Vendor: PUP.Optional.AdBundle, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\Downloads\winzip-s32-downloader.exe
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\DefaultTabBHO.DLL
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsxAF57.exe
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Conduit\ValueApps\IE\64\ValueApps.exe
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{F63AAEDC-3602-49EF-AA45-262380A98980}
Vendor: PUP.Optional.NextLive.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Roaming\newnext.me
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\TYPELIB\{C9A54DFE-051F-49C5-9FC7-ECB81DC6C69F}
Vendor: PUP.Optional.NextLive.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Roaming\newnext.me\nengine.cookie
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_app.mam.conduit.com_0.localstorage-journal
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdate.dll
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{FEB62B15-CC00-4736-AAEC-BA046C9DFF73}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\CSS\border.css
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\DefaultTab
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{BE89FFB3-7F9C-4A16-B475-98B195A06628}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\hide-1.png
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdateres_de.dll
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\CT3319613\ddt.csf
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CoCreateAsync.1.0
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\DEFAULT TAB
Vendor: PUP.Optional.Snapdo, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCH|Default_Search_URL
Vendor: PUP.Optional.FlashEnhancer.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\flashEnhancer1\Install
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0\ciie-3.2.0-11956.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\psmachine.dll
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.ProcessLauncher.1.0
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdateres_es-419.dll
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CoCreateAsync
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.OnDemandCOMClassMachine
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\redirect.html
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsaFBBF.exe
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\chromeid.txt
Vendor: PUP.Optional.NextLive.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Roaming\newnext.me\cache
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\ConsumerInputUpdateHelper.msi
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHURL|Default
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}
Vendor: PUP.Optional.OpenCandy, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Roaming\OpenCandy\2D2AB7724CBF44CE91D5AB085E0BC4C4
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\right.png
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3WebMachine
Vendor: PUP.Optional.NextLive.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Roaming\newnext.me\cache\spark.bin
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{A1E28287-1A31-4b0f-8D05-AA8C465D3C5A}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\INTERFACE\{1F8EDE97-36D5-422A-B8F0-9406E2D87C60}
Vendor: PUP.Optional.FlashEnhancer.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\flashEnhancer1\Install\Lightspark-0.5.3-win32.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Windows\Tasks\ConsumerInputUpdateTaskMachineCore.job
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\chLogic.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CoreClass
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{4A36AF02-3E2F-47DD-A102-784D22E8C2B8}
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\TYPELIB\{4A36AF02-3E2F-47DD-A102-784D22E8C2B8}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\left.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\TestIfExeExist\CT3307181
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\options.htm
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\externalJS.js
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{A1E28287-1A31-4B0F-8D05-AA8C465D3C5A}
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\manifest.json
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\tabReload.js
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\TOOLBAR|{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nszCCD3.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\down-1.png
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.OnDemandCOMClassMachine.1.0
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\DefaultTabUpdate
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\icon128.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\TestIfExeExist\CT3307181\nativeMessaging
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\bg.js
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\mam-ct3316263\mam_ch.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\background.html
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CoreMachineClass.1
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\TopFrameJS.js
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CredentialDialogMachine
Vendor: PUP.Optional.Snapdo, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Search Bar
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\DefaultTab
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Offline
Vendor: PUP.Optional.ConsumerInput.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\consumerinput_updatem
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdateres_es.dll
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\hide-3.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\CT3319613
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\APPID\DefaultTabBHO.DLL
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\defaultBlockList.js
Vendor: Rogue.Multiple, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\ProgramData\374311380
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsm452F.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\scripts\iframeHost.js
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\scripts
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\settings.json
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{B51437A3-E0E6-4046-A6E4-173B1E777C85}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\PluginWrapper.js
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsk9944.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\FBImagePreview.js
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\down-2.png
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\INTERFACE\{8050556E-4AD3-40BD-B338-7DBB0D5C10C8}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\popup.html
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.GreatArcadeHits.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\newsetup.exe
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsp67A.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.OnDemandCOMClassSvc.1.0
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\SPStub.exe
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\TYPELIB\{E1E33470-1CF0-4675-B024-56F7905C746D}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CoreClass.1
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\spch.exe
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\INTERFACE\{B71BC738-1C95-4784-B6AF-5B0964B895D9}
Vendor: PUP.Optional.Conduit, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\mam-ct3316263\ctbe.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\scripts\popup.js
Vendor: PUP.Optional.NextLive.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\genienext\nengine.dll
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\PublisherImages\homePage.png
Vendor: PUP.Optional.NextLive.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Roaming\newnext.me\nengine.dll
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdateres_ja.dll
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\GoogleChromeRemotePlugin.dll
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{BAD84EE2-624D-4e7c-A8BB-41EFD720FD77}
Vendor: PUP.Optional.Snapdo, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCH|SearchAssistant
Vendor: PUP.Optional.Tugluu.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\xkclnatwxercr\software\Plugin_V2.exe
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Conduit\ValueApps\IE\MonPrx.dll
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\DefaultTabBHO.DefaultTabBrowser.1
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\images
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nspF789.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdateres_en.dll
Vendor: Exploit.Drop.GS, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\1jfuweif.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\jquery-1.9.0.min.js
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_storage.conduit.com_0.localstorage-journal
Vendor: PUP.Optional.InboxToolBar.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\ConsumerInputUpdateBroker.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\PublisherImages\SnapDo48.png
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\twitter.png
Vendor: PUP.Optional.Amonetize.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\AMIEXT\IE plugin
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3WebSvc.1.0
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Conduit\ValueApps\IE
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\NativeMessaging\CT3307181\nativeMessaging\nmHostManifest.json
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Roaming\DefaultTab\DefaultTab
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\options.html
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\minimize-2.png
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{E171D5FB-6763-4100-87CD-5F918979FBEA}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\fb.png
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\fblike.png
Vendor: PUP.Optional.PCPerformer.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Windows\System32\roboot64.exe
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\manifest.json
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\bg.html
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\searchBox.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Roaming\ValueApps\CH\TBVerifier.dll
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\AU\SPUpdater.exe
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\INTERFACE\{BE89FFB3-7F9C-4A16-B475-98B195A06628}
Vendor: PUP.Optional.GreatArcadeHits.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\xkclnatwxercr\software\GreatArcadeHits.exe
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files\Conduit\ValueApps
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nssEF42.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\icon.png
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\scripts\background.js
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{E1E33470-1CF0-4675-B024-56F7905C746D}
Vendor: PUP.Optional.OpenCandy, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Roaming\OpenCandy\2D2AB7724CBF44CE91D5AB085E0BC4C4\RealPlayerR71POC2_p2v2.exe
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.Snapdo, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Search Page
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\mam-ct3316263\mamstub.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdateres_zh-CN.dll
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\PublisherImages\SnapDo16.png
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\DefaultTabBHO.DefaultTabBrowser
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\NativeMessaging\CT3307181
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\ProgramData\Conduit\IE
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Conduit\ValueApps\IE
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\NativeMessaging\CT3307181\nativeMessaging
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\BackPageRemove.js
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{B2D33ED6-EBBD-467C-BF6F-F175D9B51363}
Vendor: PUP.Optional.DefaultTab, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabWrap64.dll
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\down-3.png
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{96A25A24-2E87-4374-8A50-CC6F943FCE4D}
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_app.mam.vaccint.com_0.localstorage-journal
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\DefaultTabBHO.DefaultTabBrowserActiveX
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsu2A2.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\mgsplusvideo.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\ieLogic.exe
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.ProcessLauncher
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\maximize-1.png
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files\Conduit\ValueApps\IE
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\ConsumerInputUpdateOnDemand.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\up.png
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\down.png
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\PublisherImages\SnapDo128.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsd7BF8\SpSetup.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\PublisherImages\SnapDo.png
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\psuser.dll
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\CLSID\{F63AAEDC-3602-49EF-AA45-262380A98980}
Vendor: PUP.Optional.SmartBar, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Windows\Installer\MSI12B8.tmp-\Smartbar.Installer.CustomActions.dll
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsxBDF9.exe
Vendor: PUP.Optional.NextLive.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|NextLive
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{93DBF2BB-A2B3-4683-A92E-57E60751F346}
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\mam-ct3316263\mam_ie.exe
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\stub.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\hide-2.png
Vendor: PUP.Optional.Linkury.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\xkclnatwxercr\software\Installer.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CoreMachineClass
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\popup.html
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\minimize-3.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsm71FC.exe
Vendor: PUP.Optional.OpenCandy, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Roaming\OpenCandy
Vendor: PUP.Optional.PriceGong.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\PriceGong
Vendor: PUP.Optional.CrossRider.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-21-1701435897-3393982120-167953051-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Crossrider
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{B71BC738-1C95-4784-B6AF-5B0964B895D9}
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\js
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files\Conduit\ValueApps\IE\ValueAppsLoader.dll
Vendor: PUP.Optional.FlashEnhancer.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\flashEnhancer1
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Value, Location: HKLM\SOFTWARE\WOW6432NODE\DEFAULT TAB|Version
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\scripts\iframeHost.html
Vendor: PUP.Optional.ScramblePacker.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\xkclnatwxercr\software\plus-hd.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\ConsumerInputCrashHandler.exe
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nspD0DA.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\scripts\contentScripts\contentScript.js
Vendor: PUP.Optional.RelatedSearchs.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\DefaultTabToolbarBHO.DefaultTabToolbar.1
Vendor: PUP.Optional.PlusHD.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Plus-HD-1.2
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_app.mam.conduit.com_0.localstorage
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-749.exe
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\CSS
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\initdata.json
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\DefaultTabBHO.DefaultTabBrowserActiveX.1
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.Update3WebMachineFallback.1.0
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Consumer Input\Update\Install
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\AU\SPSetup.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\mam\scripts\contentScripts
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS\publisherDefinitions.js
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\NativeMessaging\CT3307181\nativeMessaging\TBMessagingHost.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}
Vendor: PUP.Optional.ConsumerInput.A, Date: 2014/05/20 14:05:03, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\ConsumerInputUpdate.exe
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.OnDemandCOMClassSvc
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\maximize-2.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\JS
Vendor: PUP.Optional.Amonetize.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\flashEnhancer1\Install\flashEnhancerInstaller.exe
Vendor: PUP.Optional.ValueAppsplugin.A, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Program Files (x86)\Conduit\ValueApps
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\up-3.png
Vendor: PUP.Optional.BundleInstaller.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\xkclnatwxercr\parent.txt
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.OnDemandCOMClassMachineFallback
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{9011F634-B91C-400D-8CA2-E9E9A1FCC725}
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_storage.conduit.com_0.localstorage
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\show-3.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3311333\setup.ini.txt
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\goopdateres_fr.dll
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{A1E28287-1A31-4B0F-8D05-AA8C465D3C5A}
Vendor: PUP.Optional.Pricegong, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pricegong.conduitapps.com_0.localstorage-journal
Vendor: PUP.Optional.Pricegong, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pricegong.conduitapps.com_0.localstorage
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\INTERFACE\{9011F634-B91C-400D-8CA2-E9E9A1FCC725}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\up-1.png
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\manifest.json
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\show-1.png
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Program Files (x86)\Consumer Input\Update\1.3.25.131\ConsumerInputUpdate.exe
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Preferences
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_app.mam.vaccint.com_0.localstorage
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\up-2.png
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\options.js
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Windows\Tasks\ConsumerInputUpdateTaskMachineUA.job
Vendor: PUP.Optional.ValueApps.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\INTERFACE\{E171D5FB-6763-4100-87CD-5F918979FBEA}
Vendor: PUP.Optional.SearchProtect.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsa7E78.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\js\options.js
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\CLASSES\ConsumerInputUpdate.CredentialDialogMachine.1.0
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\googleplus.png
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\gmail.png
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{38495740-0035-4471-851E-F5BBB86AB085}
Vendor: PUP.Optional.Consumer.Input.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{95C8DE84-989C-4235-A5B1-84E8B6A4384A}
Vendor: PUP.Optional.SnapDo.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl\1.4_0\images\show-2.png
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\ct3307181\statisticsStub.exe
Vendor: PUP.Optional.ValueApps, Date: 2014/05/20 15:43:09, Type: Folder, Location: C:\Users\jimwwms\AppData\Local\Google\Chrome\User Data\Default\Extensions\lcnnhcneegeeojhgpfijnlnocjdmlaon\1.7.0.2_0\js\js
Vendor: PUP.Optional.Conduit.A, Date: 2014/05/20 15:43:09, Type: File, Location: C:\Users\jimwwms\AppData\Local\Temp\nsx18F0.exe
Vendor: PUP.Optional.DefaultTab.A, Date: 2014/05/20 15:43:09, Type: Registry Key, Location: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{7F6AFBF1-E065-4627-A2FD-810366367D01}
===============================================================
END OF FILE
 


Edited by jimwwms, 24 May 2014 - 01:54 AM.


#15 jimwwms

jimwwms
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:06:27 PM

Posted 23 May 2014 - 11:24 PM

Arachna, sorry about delay.  Have been running ESET for 5 hours and it is 33% complete.  Hope to post results in the morning... if it is done before I must leave.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users